Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Christian CachinUniversity of Bern, Cryptology and Data Security GroupVerified email at inf.unibe.ch
- Rüdiger KapitzaFriedrich-Alexander-Universität Erlangen-NürnbergVerified email at cs.fau.de
- Alessandro SorniottiIBM Research - ZurichVerified email at zurich.ibm.com
- Valerio SchiavoniProfesseur titulaire, MER, University of NeuchâtelVerified email at unine.ch
- Pascal FelberProfessor of Computer Science, University of NeuchâtelVerified email at unine.ch
- Signe RüschFriedrich-Alexander-University Erlangen-NurembergVerified email at cs.fau.de
- Marko VukolićConsensusLab, Protocol LabsVerified email at acm.org
- Chrysoula StathakopoulouChainlink LabsVerified email at smartcontract.com
- Yacov ManevichVerified email at ibm.com
- Elli AndroulakiIBM ResearchVerified email at zurich.ibm.com
- Kai SamelinDZ HypVerified email at dzhyp.de
- Franz-Stefan PreissVerified email at dfinity.org
- Angelo De CaroIBM Research - ZurichVerified email at zurich.ibm.com
- Liran FunaroTechnion—Israel Institute of TechnologyVerified email at cs.technion.ac.il
- Manish SethiIBMVerified email at ibm.com
- Kaoutar ElkhiyaouiIBM ResearchVerified email at zurich.ibm.com